Determining proximal geolocation of IoT edge devices via covert channel
Title | Determining proximal geolocation of IoT edge devices via covert channel |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Islam, M. N., Patil, V. C., Kundu, S. |
Conference Name | 2017 18th International Symposium on Quality Electronic Design (ISQED) |
Keywords | chemical sensors, command and control center, compositionality, computer network security, covert channel, covert channels, geolocation, geolocation authentication, geolocation techniques, Geology, Intelligent sensors, Internet, Internet of Things, Internet packet router authentication, Internet protocol, IoT edge devices, IP networks, IP packets, pressure sensors, Protocols, pubcrawl, radiation sensors, Resiliency, roadside speed sensors, Routing protocols, Scalability, smart meters, telecommunication channels, Tools, trusted router |
Abstract | Many IoT devices are part of fixed critical infrastructure, where the mere act of moving an IoT device may constitute an attack. Moving pressure, chemical and radiation sensors in a factory can have devastating consequences. Relocating roadside speed sensors, or smart meters without knowledge of command and control center can similarly wreck havoc. Consequently, authenticating geolocation of IoT devices is an important problem. Unfortunately, an IoT device itself may be compromised by an adversary. Hence, location information from the IoT device cannot be trusted. Thus, we have to rely on infrastructure to obtain a proximal location. Infrastructure routers may similarly be compromised. Therefore, there must be a way to authenticate trusted routers remotely. Unfortunately, IP packets may be blocked, hijacked or forged by an adversary. Therefore IP packets are not trustworthy either. Thus, we resort to covert channels for authenticating Internet packet routers as an intermediate step towards proximal geolocation of IoT devices. Several techniques have been proposed in the literature to obtain the geolocation of an edge device, but it has been shown that a knowledgeable adversary can circumvent these techniques. In this paper, we survey the state-of-the-art geolocation techniques and corresponding adversarial countermeasures to evade geolocation to justify the use of covert channels on networks. We propose a technique for determining proximal geolocation using covert channel. Challenges and directions for future work are also explored. |
URL | http://ieeexplore.ieee.org/document/7918316/ |
DOI | 10.1109/ISQED.2017.7918316 |
Citation Key | islam_determining_2017 |
- IoT edge devices
- trusted router
- tools
- telecommunication channels
- smart meters
- Scalability
- Routing protocols
- roadside speed sensors
- Resiliency
- radiation sensors
- pubcrawl
- Protocols
- pressure sensors
- IP packets
- IP networks
- chemical sensors
- Internet Protocol
- Internet packet router authentication
- Internet of Things
- internet
- Intelligent sensors
- Geology
- geolocation techniques
- geolocation authentication
- geolocation
- covert channels
- covert channel
- computer network security
- Compositionality
- command and control center